Saturday, March 15, 2025
Homecyber securityNew Styx Stealer Attacking Users to Steal Login Passwords

New Styx Stealer Attacking Users to Steal Login Passwords

Published on

SIEM as a Service

Follow Us on Google News

A new cybersecurity threat, known as Styx Stealer, has emerged. It targets users by stealing sensitive data such as saved passwords, cookies, and autofill information from popular web browsers.

This malware affects Chromium and Gecko-based browsers and extends its reach to browser extensions, cryptocurrency wallets, and even messaging platforms like Telegram and Discord.

According to a recent tweet from ThreatMon, the revelation of Styx Stealer has raised alarms among cybersecurity experts and users alike, as it poses a significant risk to online security.

Free Webinar on Detecting & Blocking Supply Chain Attack -> Book your Spot

Exploiting Windows Defender Vulnerability

Styx Stealer exploits a vulnerability in Microsoft Windows Defender SmartScreen, identified as CVE-2023-36025, also known as Phemedrone Stealer.

This vulnerability became widespread in early 2024, allowing malicious actors to bypass security measures and infiltrate users’ systems.

Exploiting this vulnerability highlights the ongoing challenges in maintaining robust cybersecurity defenses, especially as threat actors continue to find and exploit weaknesses in widely used software.

Interestingly, a demonstration of the Styx Stealer’s capabilities has been posted on its developer’s YouTube channel.

Although the channel is not active, the demonstration has caught the attention of cybersecurity professionals working to mitigate the threat.

Additionally, a threat actor has been found offering the Styx Stealer for sale on a popular Russian forum, indicating a potential for widespread distribution.

This development underscores the need for vigilance among users and organizations to protect their digital assets.

As the situation unfolds, experts recommend that users update their security software, remain cautious of suspicious links and downloads, and regularly change their passwords to safeguard against potential breaches.

The emergence of Styx Stealer serves as a stark reminder of the evolving landscape of cyber threats and the importance of proactive cybersecurity measures.

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Access

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...